MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "bc6d3cdd-b2b7-475f-b12b-724ce6b77f54"}, "_deposit": {"id": "4848", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4848"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4848", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Analysis of Security Assessment in Software Refactoring", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Refactoring is the process of restructuringexisting computer code – changing the factoring –without changing its external behavior. It is acommon approach to producing better qualitysoftware. However, its impact on the security ofprograms has received relatively little attention.Traditionally, security of software is not consideredfrom the very beginning of a software developmentlife cycle, and it is only incorporated in the laterstages of development as an afterthought. As aconsequence, there are increased risks of securityvulnerabilities that are introduced into softwarecoding after refactoring. The proposed systemanalyses two versions (before/after code refactoring)with two methods such as detect code flaw by Viega’s12 rules and detect vulnerabilities using Access LevelGraphs (ALGs).This approach to automatically codesecurity assessment and record documents bycomparing consecutive code versions. Usingdocumented code vulnerabilities facts, developerswill be decide this refactoring is whether codesecurity level is more or less."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "refactorings"}, {"interim": "vulnerabilities"}, {"interim": "software security"}, {"interim": "security refactoring"}, {"interim": "code flaw"}, {"interim": "Access Level Graph (ALG)"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifteenth International Conference on Computer Applications(ICCA 2017)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Maw, Myint Myint"}, {"subitem_authors_fullname": "Oo, Khine Khine"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-02-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/746"}, "item_title": "Analysis of Security Assessment in Software Refactoring", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004848", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-11"}, "publish_date": "2019-07-11", "publish_status": "0", "recid": "4848", "relation": {}, "relation_version_is_last": true, "title": ["Analysis of Security Assessment in Software Refactoring"], "weko_shared_id": -1}
Analysis of Security Assessment in Software Refactoring
http://hdl.handle.net/20.500.12678/0000004848
http://hdl.handle.net/20.500.12678/000000484810534fcd-e35a-4ad5-b35b-c1a9be3eef27
bc6d3cdd-b2b7-475f-b12b-724ce6b77f54
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Analysis of Security Assessment in Software Refactoring | |||||
Language | en | |||||
Publication date | 2017-02-16 | |||||
Authors | ||||||
Maw, Myint Myint | ||||||
Oo, Khine Khine | ||||||
Description | ||||||
Refactoring is the process of restructuringexisting computer code – changing the factoring –without changing its external behavior. It is acommon approach to producing better qualitysoftware. However, its impact on the security ofprograms has received relatively little attention.Traditionally, security of software is not consideredfrom the very beginning of a software developmentlife cycle, and it is only incorporated in the laterstages of development as an afterthought. As aconsequence, there are increased risks of securityvulnerabilities that are introduced into softwarecoding after refactoring. The proposed systemanalyses two versions (before/after code refactoring)with two methods such as detect code flaw by Viega’s12 rules and detect vulnerabilities using Access LevelGraphs (ALGs).This approach to automatically codesecurity assessment and record documents bycomparing consecutive code versions. Usingdocumented code vulnerabilities facts, developerswill be decide this refactoring is whether codesecurity level is more or less. | ||||||
Keywords | ||||||
refactorings, vulnerabilities, software security, security refactoring, code flaw, Access Level Graph (ALG) | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/746 | |||||
Journal articles | ||||||
Fifteenth International Conference on Computer Applications(ICCA 2017) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |